HOME BZU Mail Box Online Games Radio and TV Live Cricket Score All Albums
Go Back   BZU PAGES: Find Presentations, Reports, Student's Assignments and Daily Discussion; Bahauddin Zakariya University Multan Institute of Computing Bachelor of Science in Telecom System BsTS 3rd Semester Data Communication


Reply
 
Thread Tools Search this Thread Rate Thread Display Modes
  #1  
Old 18-03-2011, 06:41 PM
bonfire's Avatar
M.Arsalan Qureshi

 

Join Date: Oct 2008
Location: Garden Town, Multan Cantt
Posts: 616
Program / Discipline: BSTS
Class Roll Number: 09-31
bonfire has a reputation beyond reputebonfire has a reputation beyond reputebonfire has a reputation beyond reputebonfire has a reputation beyond reputebonfire has a reputation beyond reputebonfire has a reputation beyond reputebonfire has a reputation beyond reputebonfire has a reputation beyond reputebonfire has a reputation beyond reputebonfire has a reputation beyond reputebonfire has a reputation beyond repute
Default Multimedia


Multimedia



* Cryptography is the science and art of transforming messages to make them secure and immune to attack.
* Encryption renders a message (plaintext) unintelligible to unauthorized personnel.
* Decryption transforms an intentionally unintelligible message (ciphertext) into meaningful information.
* Cryptography algorithms are classified as either symmetric-key methods or public-key methods.
* In symmetric-key cryptography the same secret key is used by the sender and the receiver.
* Substitution ciphers are either monoalphabetic or polyalphabetic.
* The P-box, S-box, and product block are methods used by block ciphers.
* DES is a symmetric-key method adopted by the U.S. government, but it has been replaced by Triple DES or other methods.
* Operation modes to handle long messages include ECB mode, CBC mode, CFM, and CSM.
* In public-key cryptography, the public key is used by the sender to encrypt the message; the private key is used by the receiver to decrypt the message.
* One of the commonly used public-key cryptography methods is the RSA algorith.
__________________

Reply With Quote
Reply

Tags
multimedia


Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes Rate This Thread
Rate This Thread:

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


Similar Threads
Thread Thread Starter Forum Replies Last Post
Dell Inspiron R Multimedia Notebook Series .BZU. Tech world 0 01-04-2011 06:45 PM

Best view in Firefox
Almuslimeen.info | Cloud Computing | Dedicated server hosting
Note: All trademarks and copyrights held by respective owners. We will take action against any copyright violation if it is proved to us.

All times are GMT +5. The time now is 06:29 PM.

Powered by vBulletin® Version 3.8.2
Copyright ©2000 - 2018, Jelsoft Enterprises Ltd.
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.